This document describes how to set up, configure and use TimeVault on Ubuntu 7.10. The resulting system provides a powerful backup system for desktop usage. TimeVault is a simple front-end for making snapshots of a set of directories. Snapshots are a copy of a directory structure or file at a certain point in time. Restore functionality is integrated into Nautilus - previous versions of a file or directory that has a snapshot can be accessed by examining the properties and selecting the 'Previous Versions' tab.

Linux networking cookbook is a book for both a seasoned and new Linux network administrator. It includes valuable time saving recipes, tools and related resources. The book is written in clear and concise style with tons of examples and working code. Book covers wild verity of topics or so called recipes for Linux networking.

Use IBM Network Authentication Service (IBM NAS) for AIX to learn about the Kerberos policy management for passwords, and get acquainted with anything and everything about IBM NAS policy. Also examine complete commands, examples, and scenarios to assist you in using the kerberos password policy to its fullest.

Pound is a reverse-proxy load balancing server. It accepts requests from HTTP / HTTPS clients and distributes them to one or more Web servers. The HTTPS requests are decrypted and passed to the back-ends as plain HTTP. It will act as:

a) Server load balancer
b) Reverse proxy server
c) Apache reverse proxy etc
d) It can detects when a backend server fails or recovers, and bases its load balancing decisions on this information: if a backend server fails, it will not receive requests until it recovers
e) It can decrypts https requests to http ones
f) Rejects incorrect requests
h) It can be used in a chroot environment (security feature)

Learn about an efficient virtualization approach for the Cell/B.E. processor regarding hardware resources called container virtualization, and the open source software OpenVZ Linux project. This first article discusses basic concepts, architectures, and tools of OpenVZ and Cell/B.E., and how they work together.

Every Web application needs a good database design behind it, and usually much sooner than almost every small-site developer thinks. It's actualy not that hard to configure a simple RDBMS, and good bindings for most back ends almost surely exist for your favorite programming language or framework. Rather than wait, just set up a RDBMS right at the beginning, and work from there.

Demilitarized zone, used to secure an internal network from external access. You can use Linux firewall to create DMZ easily. There are many different ways to design a network with a DMZ. The basic method is to use a single Linux firewall with 3 Ethernet cards. The following simple example discusses DMZ setup and forwarding public traffic to internal servers.

This document describes how to set up a CentOS 5.1 desktop. It provides all you need for daily work and entertainment, incl. multimedia codecs, Adobe Flash, Adobe Reader, Skype, TrueType fonts, VMware Server, ntfs-3g, Sun Java, and many more.

This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I will also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I will show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses.

When working with XML you really need a way to describe a namespace using multiple resources, including DTDs, XML Schemas, XSL stylesheets and software documents. The Resource Directory Description Language (RDDL) allows you to do exactly this! Parse RDDL descriptors with an API in the XML_RDDL package from PEAR, and extract resource information for use in any PHP application.

The Net-SNMP library now has Python bindings, and it is an excellent choice to write custom code to manage a data center or supplement full-blown Network Management Systems. In this article, learn how to use Net-SNMP, Python, and the IPython shell to interactively explore and manage a network.

"I said "void the warranty" and I meant it. The process I went through today means it'll be harder for me to complain to Apple if things get weird, so be cautious! Given the experience I've had, I think HDDs will soon be given easy-access panels, like RAM has, because swapping a 2.5" SATA turns out to be straightforward, and the software, at least as far as Apple goes, is ready for novices"

Your Debian / Ubuntu Linux box security depends upon access to system services (one of many aspects). For example, you may need to provide a web server (Apache service) to serve web pages. However, if you do not need use a service, you should always turn off all unused services to avoid exploits.

Traditionally, Debian provided various tools to manage services. There are various methods for managing access to system services:
a) /etc/init.d/service
b) rcconf
c) update-rc.d etc

Under Red hat and Centos Linux you can use chkconfig command (ntsysv command) to configure Sys V style init script links. There is also service command to stop / start / restart services.